Adds missing SAML Realm Settings (elastic/x-pack-elasticsearch#4221)

Adds idp.use_single_logout and populate_user_metadata 
in the SAML Realm Settings Set.

Resolves elastic/x-pack-elasticsearch#4219

Original commit: elastic/x-pack-elasticsearch@360f1f744e
This commit is contained in:
Ioannis Kakavas 2018-03-28 09:20:28 +03:00 committed by GitHub
parent 77614658d5
commit d1ed4e0bff
1 changed files with 2 additions and 2 deletions

View File

@ -75,10 +75,10 @@ public class SamlRealmSettings {
* @return The {@link Setting setting configuration} for this realm type * @return The {@link Setting setting configuration} for this realm type
*/ */
public static Set<Setting<?>> getSettings() { public static Set<Setting<?>> getSettings() {
final Set<Setting<?>> set = Sets.newHashSet(IDP_ENTITY_ID, IDP_METADATA_PATH, final Set<Setting<?>> set = Sets.newHashSet(IDP_ENTITY_ID, IDP_METADATA_PATH, IDP_SINGLE_LOGOUT,
SP_ENTITY_ID, SP_ACS, SP_LOGOUT, SP_ENTITY_ID, SP_ACS, SP_LOGOUT,
NAMEID_FORMAT, NAMEID_ALLOW_CREATE, NAMEID_SP_QUALIFIER, FORCE_AUTHN, NAMEID_FORMAT, NAMEID_ALLOW_CREATE, NAMEID_SP_QUALIFIER, FORCE_AUTHN,
CLOCK_SKEW, POPULATE_USER_METADATA, CLOCK_SKEW,
ENCRYPTION_KEY_ALIAS, SIGNING_KEY_ALIAS, SIGNING_MESSAGE_TYPES); ENCRYPTION_KEY_ALIAS, SIGNING_KEY_ALIAS, SIGNING_MESSAGE_TYPES);
set.addAll(ENCRYPTION_SETTINGS.getAllSettings()); set.addAll(ENCRYPTION_SETTINGS.getAllSettings());
set.addAll(SIGNING_SETTINGS.getAllSettings()); set.addAll(SIGNING_SETTINGS.getAllSettings());